[1]
G. G. N. C. V. S. S., “Utilizing the protected learning calculation method to forestall the Black Hole Attacks in Mobile ad-hoc networks”, IJRITCC, vol. 4, no. 4, pp. 559–563, Apr. 2016.